Ransomware victim disclosure
← All victimsBEESENSE
Claimed by Quantum · listed 4 years ago
Status timeline
- Listed
Aug 4, 2022
- Data leaked
At a glance
- Group
- Quantum
- Status
- Data leaked
- Country
- Israel
- Sector
- Manufacturing
- Listed on leak site
- Aug 4, 2022
About the victim
AI dossier — public-source company profileBeeSense designs, develops, and manufactures advanced multi-sensor technology-based solutions for intelligence, surveillance, and reconnaissance (ISR) applications. The company also produces independent wireless communication and power infrastructure systems. It operates in the homeland security and defense sectors, based in Israel.
- Industry
- Defense & Homeland Security Technology
Attack summary
Severity: critical — The victim operates in the defense and homeland security sector, developing ISR and surveillance technologies. Exfiltration and publication of data from a defense-oriented company constitutes a critical severity event due to the potential exposure of sensitive national security-adjacent technology, proprietary defense systems, and potentially classified or export-controlled information.The Quantum ransomware group claims to have attacked BeeSense and has published data (disclosed status: data_published), indicating exfiltration of company data related to its defense and homeland security operations. No ransom amount or explicit data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Defense technology documentation
- Multi-sensor system designs
- Surveillance and reconnaissance project files
- Wireless communication infrastructure data
- Internal business records
What the group claims
BeeSense designs, develops and manufactures advanced, unique, multi-sensor technology-based solutions and independent, wireless communication & power infrastructures for intelligence, surveillance and reconnaissance in the homeland security and defense sectors.
Source
Indexed 4 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
